TY - GEN
T1 - Secure computation using leaky tokens
AU - Prabhakaran, Manoj
AU - Sahai, Amit
AU - Wadia, Akshay
PY - 2014
Y1 - 2014
N2 - Leakage-proof hardware tokens have been used to achieve a large number of cryptographic tasks recently. But in real life, due to various physical attacks, it is extremely difficult to construct hardware devices that are guaranteed to be leakage-proof. In this paper, we study the feasibility of general two-party computation using leaky hardware tokens. Our main result is a completeness theorem that shows that every non-trivial leaky two-party functionality can be used for general secure computation. In fact, the protocol we construct is non-interactive and unconditionally secure. There are no restrictions on the leakage functions associated with the token, except that it does not render the tokens trivial, by revealing its entire secrets to the adversary.
AB - Leakage-proof hardware tokens have been used to achieve a large number of cryptographic tasks recently. But in real life, due to various physical attacks, it is extremely difficult to construct hardware devices that are guaranteed to be leakage-proof. In this paper, we study the feasibility of general two-party computation using leaky hardware tokens. Our main result is a completeness theorem that shows that every non-trivial leaky two-party functionality can be used for general secure computation. In fact, the protocol we construct is non-interactive and unconditionally secure. There are no restrictions on the leakage functions associated with the token, except that it does not render the tokens trivial, by revealing its entire secrets to the adversary.
UR - http://www.scopus.com/inward/record.url?scp=84904177677&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84904177677&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-43948-7_75
DO - 10.1007/978-3-662-43948-7_75
M3 - Conference contribution
AN - SCOPUS:84904177677
SN - 9783662439470
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 907
EP - 918
BT - Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Proceedings
PB - Springer
T2 - 41st International Colloquium on Automata, Languages, and Programming, ICALP 2014
Y2 - 8 July 2014 through 11 July 2014
ER -